Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118.dll
-
Size
208KB
-
MD5
49771a3bad6cc214819d8c8f99d69e44
-
SHA1
6e6c9e28c47a33f47a0436eb156a905a8e10bd4b
-
SHA256
9be9152459f376dd2719e6e40c8c2b1015a6c98d7e8d4fe3fb5450e71bf08393
-
SHA512
56ae6424a63092c54b9a883176d1aca11f15757da97357e82efc00937641ebb926524d398f40f2c594480060365cbe707682f3a36fbedb6fc4405165eebf7ae0
-
SSDEEP
3072:gz0Up1VYik5/NJueo9W3SvrGMx/il23MpwecxStW5w2IT2PilpLO8PjTl:gz0K3Emeo9RDZcpwechtIaPe5
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2700 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{391E80DD-DC5C-4aca-9941-E8E80675E805} regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\h9app.dll regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805}\ProgID\ = "Holland2.Holl2Sink.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\TypeLib\ = "{9F993423-35FB-4C1F-A52E-62E8A415C6AF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805}\TypeLib\ = "{2D88CE82-170F-4EFD-96F4-EF38C62794CB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9F993423-35FB-4C1F-A52E-62E8A415C6AF}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D88CE82-170F-4EFD-96F4-EF38C62794CB}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\holland2m.HtmlPP.1\ = "HtmlPP Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{74CAC7F3-2682-488D-9D1B-9139E1B44E52}\ = "Holland2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D88CE82-170F-4EFD-96F4-EF38C62794CB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{6BBB01C2-4C64-4369-B486-392C4AD853F3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\ = "HtmlPP Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9F993423-35FB-4C1F-A52E-62E8A415C6AF}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\holland2m.HtmlPP.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\Holland2.DLL\AppID = "{74CAC7F3-2682-488D-9D1B-9139E1B44E52}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Holland2.Holl2Sink\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805}\AppID = "{74CAC7F3-2682-488D-9D1B-9139E1B44E52}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Holland2.Holl2Sink regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\ProgID\ = "holland2m.HtmlPP.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D88CE82-170F-4EFD-96F4-EF38C62794CB}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Holland2.Holl2Sink.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\holland2m.HtmlPP\ = "HtmlPP Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\holland2m.HtmlPP\CurVer\ = "holland2m.HtmlPP.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Holland2.Holl2Sink\CurVer\ = "Holland2.Holl2Sink.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\TypeLib\ = "{2D88CE82-170F-4EFD-96F4-EF38C62794CB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\TypeLib\ = "{9F993423-35FB-4C1F-A52E-62E8A415C6AF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9F993423-35FB-4C1F-A52E-62E8A415C6AF}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Holland2.Holl2Sink.1\ = "Holl2Sink Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBE4D01D-8414-46d5-90F5-A0699E263D74}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\TypeLib\ = "{2D88CE82-170F-4EFD-96F4-EF38C62794CB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html\ = "H2M" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html\CLSID = "{BBE4D01D-8414-46d5-90F5-A0699E263D74}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9F993423-35FB-4C1F-A52E-62E8A415C6AF}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\h9app.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D88CE82-170F-4EFD-96F4-EF38C62794CB}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\holland2m.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\holland2m.HtmlPP\CLSID\ = "{BBE4D01D-8414-46d5-90F5-A0699E263D74}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\TypeLib\ = "{9F993423-35FB-4C1F-A52E-62E8A415C6AF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9F993423-35FB-4C1F-A52E-62E8A415C6AF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{391E80DD-DC5C-4aca-9941-E8E80675E805}\VersionIndependentProgID\ = "Holland2.Holl2Sink" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\holland2m.HtmlPP\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D88CE82-170F-4EFD-96F4-EF38C62794CB}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9F993423-35FB-4C1F-A52E-62E8A415C6AF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6BBA6850-DC0F-4E62-BB12-2D0752584FEB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F639C582-A54C-4ABC-B67C-592ED5E48E6A}\ = "IHtmlPP" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{74CAC7F3-2682-488D-9D1B-9139E1B44E52} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D88CE82-170F-4EFD-96F4-EF38C62794CB}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\holland2m.DLL\AppID = "{6BBB01C2-4C64-4369-B486-392C4AD853F3}" regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 1612 wrote to memory of 3056 1612 regsvr32.exe 29 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30 PID 3056 wrote to memory of 2700 3056 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s h9app.dll3⤵
- Loads dropped DLL
- Modifies registry class
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD52e47f50e5672e6b67292b79fdd42a867
SHA1b15c812c38059707d2a4ce994c981631da8f21a6
SHA2563956ef1858b259587ba77c1019c7c6933396287493074acff48bb5f0e1859482
SHA512e554b7de0576915ab88b7eafd1a68b4687376ac8593ed3ce4021b258a33fb1ffcb017171fc7616e8c5fafc6a621e415c299ccd224744ff48c299e3aeebaa0a2a